<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Privacy Issues in IoT Ecosystems from an Individual Employee&apos;s Perspective</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<settlement>Turku</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Privacy Issues in IoT Ecosystems from an Individual Employee&apos;s Perspective</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">152EED0EA074C162DEAC22C5AB88EE08</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract xml:lang="fi">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Vermanen Mikko 1[0000- 0003-3500-6974] and Rantanen Minna M.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>IoT solutions provide an opportunity to collect a vast amount of identifiable data <ref type="bibr" target="#b0">(Atzori et al., 2010)</ref> with a variety of embedded sensors <ref type="bibr" target="#b2">(Lee &amp; Lee, 2015)</ref>, delivered to the users in a readable form via internet. While individuals should be able control what identifiable data is collected from their actions, it can become impossible to independently ensure personal privacy in the often complex IoT environment <ref type="bibr" target="#b0">(Atzori et al. 2010)</ref>, where the border between personal and non-personal is prone to become unclear <ref type="bibr" target="#b4">(Oriwoh et al., 2013)</ref>. Consequently, as proposed by <ref type="bibr" target="#b1">Baldini et al. (2018)</ref>, the concept of privacy should be revisited in IoT due to the rapidly growing amount of data, whose nature in terms of personal privacy has already become difficult to define. Our aim is to help filling this research gap by including the pivotal privacy issues in an IoT-specific ethical framework, whose purpose will be to aid companies and individuals to prevent or correct the possible ethical conflicts connected to their approach towards IoT deployment. The final framework will cover six issue categories found relevant in the IoT context: privacy, accuracy, property, accessibility, motivation and security.</p><p>Considering the employees' often limited abilities to independently control their data privacy (x), we emphasize the importance of addressing the ethical responsibilities of managerial level actors. However, in some cases even the management may not be able to thoroughly understand or control the data collection and processing mechanics, nor the organization's responsibilities towards their employees. Thus, our goal is to help the organizations using IoT to understand and prevent potential ethical issues by developing a practical framework for people developing and implementing IoT ecosystems in organisational settings.</p><p>The framework is based on the Mason's notions about the ethical issues of information age <ref type="bibr" target="#b3">(Mason, 1986</ref>) and preliminary investigations of the ethical issues of IoT in small and medium-sized enterprises <ref type="bibr" target="#b5">(Vermanen et al., 2019)</ref>. In this short paper, we focus on the privacy issues and some of the critical privacy questions associated with the IoT-based data collection, that should be implemented in the practical framework. Our initial idea of the framework <ref type="bibr" target="#b5">(Vermanen et al., 2019)</ref> is constructed from questions that should be considered. However, there still is a need to consider the ethical issues in more depth in order to provide a functional tool for the practitioners. After considering multitude of approaches we agreed upon a technical solution in simple form of survey. In this paper we present the part considering privacy. <ref type="bibr" target="#b3">Mason (1986)</ref> described the growth of information technology and the increased value of information in decision-making as the two main forces threatening our privacy. These aspects are widely present in the rapidly growing IoT technology, whose benefits rely heavily on collected data. Mason also claimed that the central issues caused by the growth of technology are the enhanced capacity for surveillance, communication, computation, storage and retrieval, which maintain their relevancy in the modern IoT solutions as well. However, as stated by <ref type="bibr" target="#b6">Woodward et al. (2011)</ref>, the purpose of Mason's essay was to ignite discussion on the ethical issues rather than specifically defining them as theoretical constructs.</p><p>Mason opened the discussion on privacy issues with three central questions: "What information should one be required to divulge about one's self to others? Under what conditions? What information should one be able to keep strictly to one's self?" The survey introduced in this paper will consider these questions as follows:</p><p>What information should one be required to divulge about one's self to others? What information should one be able to keep strictly to one's self?</p><p>The investigation of this topic will be divided into two main categories: the collection of data and the distribution of data. The analysis of both categories will be again divided between anonymous and identifiable data to investigate both the respondents' overall principles regarding data collection and their personally involved views.</p><p>• Under what conditions information can be collected and shared?</p><p>The respondents' views on the mentioned perspectives will be examined based on the following definitions: whether, when, how, by whom and to whom the data can be collected and distributed. These definitions are expected to cover the majority of aspects relevant to the collection and distribution of both anonymous and identifiable data. The survey will deploy a 7-point Likert scale ranging from 'Strongly agree' to 'Strongly disagree'. It will be delivered to 50 SMEs currently utilising IoT. Within these companies, the survey will be targeted towards individuals representing both employee and manager status to gain insight from the potential conflicts between different organizational hierarchy levels. Finally, the survey results are expected to enable us to verify the most pivotal privacy issues which should be added to final ethical IoT framework.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The internet of things: A survey</title>
		<author>
			<persName><forename type="first">L</forename><surname>Atzori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Iera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Morabito</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer networks</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page" from="2787" to="2805" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Ethical design in the internet of things</title>
		<author>
			<persName><forename type="first">G</forename><surname>Baldini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Botterman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Neisse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tallacchini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science and engineering ethics</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="905" to="925" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The Internet of Things (IoT): Applications, investments, and challenges for enterprises</title>
		<author>
			<persName><forename type="first">I</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Horizons</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="431" to="440" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Four ethical issues of the information age</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">O</forename><surname>Mason</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Ethics</title>
		<imprint>
			<biblScope unit="page" from="41" to="48" />
			<date type="published" when="1986">1986</date>
			<publisher>Routledge</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Internet of things forensics: Challenges and approaches</title>
		<author>
			<persName><forename type="first">E</forename><surname>Oriwoh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Jazani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Epiphaniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sant</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th IEEE International Conference on Collaborative computing: networking, Applications and Worksharing</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013-10">2013. October</date>
			<biblScope unit="page" from="608" to="615" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Ethical Challenges of IoT Utilization in SMEs from an Individual Employee&apos;s Perspective</title>
		<author>
			<persName><forename type="first">M</forename><surname>Vermanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Rantanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Harkke</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Expansion and Validation of the PAPA Framework</title>
		<author>
			<persName><forename type="first">B</forename><surname>Woodward</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">L</forename><surname>Martin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Imboden</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Education Journal</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">28</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
